Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

MikroTikCertified Network Associate Exam Question and Answers

MikroTikCertified Network Associate Exam

Last Update Oct 15, 2025
Total Questions : 110

We are offering FREE MTCNA MikroTik exam questions. All you do is to just go and sign up. Give your details, prepare MTCNA free exam questions and then go for complete pool of MikroTikCertified Network Associate Exam test questions that will help you more.

MTCNA pdf

MTCNA PDF

$42  $104.99
MTCNA Engine

MTCNA Testing Engine

$50  $124.99
MTCNA PDF + Engine

MTCNA PDF + Testing Engine

$66  $164.99
Questions 1

In WinBox when clicking the 'Backup' button in the Files window, the following happens (select all that apply):

Options:

A.  

Backup file is created. Name contains the router identity, the date and time of its creation

B.  

Backup file is saved to the computer desktop

C.  

Backup file will contain usernames and passwords of the router

D.  

Optionally backup name and password can be specified

Discussion 0
Questions 2

Which statements are true regarding ICMP packets?

    ICMP guarantees datagram delivery.

    ICMP can provide hosts with information about network problems.

    ICMP is encapsulated within IP datagrams.

    ICMP is encapsulated within UDP datagrams.

Options:

A.  

1 only

B.  

2 and 3

C.  

1 and 4

D.  

All of the above

Discussion 0
Questions 3

Which computers would be able to communicate directly (without any routers involved)?

Options:

A.  

192.168.17.15/29 and 192.168.17.20/28

B.  

10.5.5.1/24 and 10.5.5.100/25

C.  

10.10.0.17/22 and 10.10.1.30/23

D.  

192.168.0.5/26 and 192.168.0.100

Discussion 0
Questions 4

MikroTik RouterOS commands can be run once a day by:

Options:

A.  

/system watchdog

B.  

/system cron

C.  

/system scheduler

Discussion 0
Questions 5

You need to reboot a RouterBoard after importing a previously exported rsc file to activate the new configuration.

Options:

A.  

True

B.  

False

Discussion 0
Questions 6

What is the main reason the OSI model was created?

Options:

A.  

To create a layered model larger than the DoD model.

B.  

So application developers can change only one layer's protocols at a time.

C.  

So different networks could communicate.

D.  

So Cisco could use the model.

Discussion 0
Questions 7

A client that has successfully connected to a wireless network is considered to be which of the following? Choose all that apply:

Options:

A.  

Authenticated

B.  

Associated

C.  

Unauthenticated

D.  

Unassociated

Discussion 0
Questions 8

What menus should be used to allow certain websites to be accessed from behind a Hot-Spot interface, without client authentication?

Options:

A.  

ip Hot-Spot ip-binding

B.  

ip Hot-Spot profile

C.  

ip Hot-Spot walled-garden

D.  

ip Hot-Spot walled-garden ip

Discussion 0
Questions 9

Select valid subnet masks:

Options:

A.  

255.192.0.0

B.  

255.255.192.255

C.  

192.0.0.0

D.  

255.255.224.0

Discussion 0
Questions 10

What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?

Options:

A.  

NAT

B.  

Static

C.  

Dynamic

D.  

PAT

Discussion 0
Questions 11

Which wireless mode allows you to connect to any standard AP (not only MikroTik) and to beable to bridge this wireless interface to an Ethernet?

Options:

A.  

station-pseudobridge

B.  

station

C.  

station-wds

D.  

bridge

Discussion 0
Questions 12

It is impossible to disable user “admin” at the menu “/user”

Options:

A.  

True

B.  

False

Discussion 0
Questions 13

For user in local PPP Secrets/PPP Profiles database, it is possible to:

Options:

A.  

Allow/deny use of more than one login by this user

B.  

Allow login by PPPoE and PPTP, but deny login by L2TP

C.  

Set max values for transferred data (Rx/Tx)

D.  

Allow only PPPoE login

E.  

Deny services (like telnet) only for this user or for one group of users

Discussion 0
Questions 14

If you wish to block user access to MSN messenger, which chain should the firewall rule be placed in?

Options:

A.  

input

B.  

process

C.  

forward

D.  

output

Discussion 0
Questions 15

What is the minimal possible wireless configuration to create an Access Point?

Options:

A.  

radio name

B.  

scan-list

C.  

frequency

D.  

band

E.  

ssid

F.  

DFS mode

G.  

WDS

Discussion 0
Questions 16

Action=redirect is applied in:

Options:

A.  

chain=srcnat

B.  

chain=forward

C.  

chain=dstnat

Discussion 0
Questions 17

What is the default protocol/port of (secure) winbox?

Options:

A.  

UDP/5678

B.  

TCP/22

C.  

TCP/8291

D.  

TCP/8080

Discussion 0
Questions 18

NAT rule is going to catch SMTP traffic and send it to a specific mail server. What is the correct action for a NAT rule?

Options:

A.  

passthrough

B.  

dst-nat

C.  

redirect

D.  

tarpit

Discussion 0
Questions 19

Where is a hub specified in the OSI model?

Options:

A.  

Session layer

B.  

Physical layer

C.  

Data Link layer

D.  

Application layer

Discussion 0
Questions 20

MAC layer by OSI model is also known as

Options:

A.  

Layer 2

B.  

Layer 1

C.  

Layer 6

D.  

Layer 7

E.  

Layer 3

Discussion 0
Questions 21

What is the default TTL (time to live) on a router that an IP packet can experience before it will be discarded?

Options:

A.  

60

B.  

30

C.  

1

D.  

64

Discussion 0
Questions 22

What is a stub network?

Options:

A.  

A network with more than one exit point.

B.  

A network with more than one exit and entry point.

C.  

A network with only one entry and no exit point.

D.  

A network that has only one entry and exit point.

Discussion 0
Questions 23

What can be used as ’target-address’ in the simple queue?

Options:

A.  

client’s MAC address

B.  

server’s address

C.  

address list name

D.  

client’s address

Discussion 0
Questions 24

Evaluate the following information:

Access Point configuration:

-- wlan1 is in 'AP-Bridge' mode

-- Bridge1 has wlan1 and ether1 as ports

CPE configuration:

-- wlan1 is in 'Station-Bridge' mode

-- Bridge1 has wlan1 and ether1 as ports

Select protocols that will pass from ether1 on the CPE to ether1 on the Access Point:

Options:

A.  

IPv4

B.  

ARP

C.  

USB

D.  

BGP

E.  

Firewire

F.  

IPv6

G.  

DHCP

Discussion 0
Questions 25

Which router command allows you to view the entire contents of all access lists?

Options:

A.  

show all access-lists

B.  

show access-lists

C.  

show ip interface

D.  

show interface

Discussion 0
Questions 26

If a packet comes to a router and starts a new, previously unseen connection, which connection state would be applied to it?

Options:

A.  

no connection state would be applied to such packet

B.  

new

C.  

unknown

D.  

invalid

E.  

established

Discussion 0
Questions 27

What is marked by connection-state=established matcher?

Options:

A.  

Packet belongs to an existing connection, for example a reply packet or a packet which belongs to already replied connection

B.  

Packet is related to, but not part of an existing connection

C.  

Packet does not correspond to any known connection

D.  

Packet begins a new TCP connection

Discussion 0
Questions 28

Firewall NAT rules process only the first packet of each connection.

Options:

A.  

True

B.  

False

Discussion 0
Questions 29

If 'check-gateway' is enabled for an ECMP route and one of the gateways is unreachable, then:

Options:

A.  

ECMP is going to send packets to all gateways even if one is unreachable

B.  

The unreachable gateway is not going be used in Round Robin algorithm

C.  

The ECMP route becomes inactive

Discussion 0
Questions 30

RouterOS log messages are stored on disk by default

Options:

A.  

True

B.  

False

Discussion 0
Questions 31

What is the term for the hardware coded address found on an interface?

Options:

A.  

FQDN Address

B.  

IP Address

C.  

Interface Address

D.  

MAC Address

Discussion 0
Questions 32

Destination NAT (chain dstnat, action dst-nat) can be used to:

Options:

A.  

Change destination port

B.  

Direct users from the Internet to a server within your local network

C.  

Change source port

D.  

Hide your local network from the Internet

Discussion 0
Questions 33

Consider the following network diagram. In R1, you have the following configuration:

/ip route

add dst-address=192.168.1.0/24 gateway=192.168.99.2

/ip firewall nat

add chain=srcnat out-interface=Ether1 action=masquerade

On R2, if you wish to prevent all access to a server located at 192.168.1.10 from LAN1 devices, which of the following rules would be needed?

Options:

A.  

/ip firewall filter add chain=forward src-address=192.168.99.1 dst-address=192.168.1.10 action=drop

B.  

/ip firewall filter add chain=forward src-address=192.168.0.0/24 dst-address=192.168.1.10 action=drop

C.  

/ip firewall filter add chain=input src-address=192.168.99.1 dst-address=192.168.1.10 action=drop

D.  

/ip firewall nat add chain=dstnat src-address=192.168.99.1 dst-address=192.168.1.10 action=drop

Discussion 0